全文获取类型
收费全文 | 118篇 |
免费 | 0篇 |
专业分类
各国政治 | 2篇 |
世界政治 | 1篇 |
法律 | 44篇 |
中国政治 | 7篇 |
政治理论 | 1篇 |
综合类 | 63篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 8篇 |
2013年 | 6篇 |
2012年 | 1篇 |
2011年 | 10篇 |
2010年 | 2篇 |
2009年 | 7篇 |
2008年 | 11篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 5篇 |
2004年 | 9篇 |
2003年 | 9篇 |
2002年 | 4篇 |
2001年 | 8篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
排序方式: 共有118条查询结果,搜索用时 15 毫秒
81.
大鼠实验性脑挫伤后不同时间脑apoE的表达 总被引:2,自引:0,他引:2
目的观察大鼠实验性脑挫伤后脑内apoE蛋白变化的时空性规律。方法采用自由落体撞击法致大鼠脑挫伤模型,观察伤后不同时间(0.5h、2h、6h、12h、24h、3d、7d、14d)apoE蛋白的变化,并用计算机图像分析技术作定量统计分析。结果伤后0.5h组脑皮质神经元apoE出现阳性表达,3d达到高峰,随后下降;伤后0.5h组在海马出现apoE强阳性反应,CA1区在伤后3d达到高峰,而CA2~CA4区在24h达到高峰,随后逐渐下降,伤后海马apoE表达以CA1区最强。结论挫伤后apoE时空性变化规律可作为脑损伤时间推断、早期诊断及生前伤和死后伤鉴别的一个新的参考指标。 相似文献
82.
随着信息技术的高速发展 ,培养既精通计算机应用技术又懂得公安业务的复合型高素质人才 ,已成为公安院校教学改革的当务之急。为了更好地开展计算机应用专业的教学 ,应将公安系统对计算机应用专业人才的需求状况进行预测分析 ,以确保正确的教学方向。 相似文献
83.
电子商务合同的订立程序、书面形式和签字确认等问题与传统合同制度有很多不同 ,如何建立和完善电子商务合同相关立法是当前急需研究解决的法律课题 ,本文即对这一问题进行研究 ,指出应在我国合同法中增加电子商务合同的相关规定。 相似文献
84.
本文结合辽宁警专目前计算机实验教学的实际状况和计算机实验教学改革的一些尝试,对如何充分发挥新建计算机实验室的作用,进一步规范计算机实验教学内容、改革实验课考核方式、充分发挥学生在实验教学和管理中的作用等问题进行了思考与探讨。 相似文献
85.
Memory analysis has gained popularity in recent years proving to be an effective technique for uncovering malware in compromised computer systems. The process of memory acquisition presents unique evidentiary challenges since many acquisition techniques require code to be run on a potential compromised system, presenting an avenue for anti-forensic subversion. In this paper, we examine a number of simple anti-forensic techniques and test a representative sample of current commercial and free memory acquisition tools. We find that current tools are not resilient to very simple anti-forensic measures. We present a novel memory acquisition technique, based on direct page table manipulation and PCI hardware introspection, without relying on operating system facilities - making it more difficult to subvert. We then evaluate this technique's further vulnerability to subversion by considering more advanced anti-forensic attacks. 相似文献
86.
The undertaking of e-mail investigations was previously limited mainly to law enforcement agencies. However, UK organisations are increasingly undertaking e-mail investigation activities for incidents such as fraud, accessing or distributing indecent images and harassment amongst others. Organisations are also increasingly using computer forensic analysts to search through e-mail archives in order to gather evidence relating to e-mail misuse. In this paper we examine the legal aspects of UK corporate e-mail investigations. 相似文献
87.
Lars Emanuelsson Korsell Krister Söderman 《Journal of Scandinavian Studies in Criminology & Crime Prevention》2013,14(1):5-14
This article constitutes an attempt to describe the nature of IT-related crime and how it is likely to evolve in the future. By means of a number of empirical studies, the authors have attempted to estimate the prevalence of a number of different IT-related incidents and offences in Sweden during the period 1997-1998. The article shows that IT-related crime consists to a large extent of less serious offences. One might say that everyday crime has expanded into a new technological environment. Parts of the study nonetheless indicate that there are more serious IT-related offences being committed. In this regard the authors' focus is on offences related to the most valuable commodity in modern society, information. On the basis of the empirical studies, two different developmental patterns are identified; the first of these involves everything carrying on much the same as before, with no real evidence of any radical shift taking place; the second involves society going through a period of relatively comprehensive structural and technological change, which in turn is creating new and dangerous opportunity structures for crime. 相似文献
88.
89.
Mark Taylor John Haggerty David Gresty Tom BerryAuthor vitae 《Computer Law & Security Report》2011,27(6):647-652
In this paper we examine the legal aspects of the forensic investigation of peer-to-peer networks. Organisations may encounter instances where employees have used peer-to-peer software for a variety of types of computer misuse including the dissemination of copyrighted materials or indecent images, or instances where peer-to-peer software has been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer-to-peer networks. 相似文献
90.
王孔祥 《西安政治学院学报》2013,(3):104-110
计算机网络攻击在技术上已经具备实战价值,引起各国的重视;但它的匿名性、跨国性和非对称性等特点,以及随之而来的网络军备竞赛,对各国的网络安全构成严峻的挑战。现行国际法所存在的空白、盲点,有可能导致网络战和计算机网络攻击的滥用。为防止网络战争的发生,国际社会有必要运用法律手段来规制计算机网络攻击。而鉴于达成具有普遍约束力的法律文件尚有难度,可尝试先通过外交声明之类的"软法"文件,来汇聚共识,形成合力。 相似文献